#1 You can use advanced firewall rules for this#2 You can use firewall rules and 2FA to enforce ssh, combined with security certificates#3 Check your IDPS alerts and allow blocked but needed resources#4 Which ones? Firewall logs?#5 Don't understand this question#6 You can create other users and assign permissions, root can be disabled, all from the WebGUI